Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Incorrect OID usage when calling request-certificate with --attestation flag. #526

Open
jcspencer opened this issue Dec 24, 2024 · 0 comments

Comments

@jcspencer
Copy link

Hi there!

When calling request-certificate, one can pass in the --attestation flag to include the attestation flag in extensions stapled to the CSR:

$ yubico-piv-tool -a generate -s 9c -A RSA2048 -o pub.key
Successfully generated a new private key.

$ yubico-piv-tool -a verify-pin -a request-certificate --attestation -s 9c -S '/CN=digi_sign/OU=test/O=example.com/' -i pub.key -o csr.pem

I have noticed is that the OID used to staple the attestation to the CSR, 1.3.6.1.4.1.41482.3.11 used here and here is different from what is defined in the PIV Attestation OID Arc documentation.

From my understanding, it should likely be 1.3.6.1.4.1.41482.3.1, as referenced in the Yubikey OID reference:

  • 1.3.6.1.4.1.41482.3.1: Attestation data and signature
  • 1.3.6.1.4.1.41482.3.2: Attestation certificate
  • 1.3.6.1.4.1.41482.311: CSPN

More than happy to create a PR for this, but I was curious if the .11 OID is either a typo, or was used as a "new" value - outside of the OID spec at the time of implementation - that has subsequently been assigned to CSPN?

Thanks!

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Development

No branches or pull requests

1 participant